secret operation 中文意思是什麼

secret operation 解釋
黑箱操作
  • secret : adj 1 秘密的;機密的;隱秘的。2 僻遠的。3 隱藏的;看不見的。4 神秘的;奧妙的;不可思議的。5 隱居...
  • operation : n 1 動作,行動,活動;業務,工作;作用。2 效果,效力;有效范圍,有效期間。4 【數學】運算;【醫學...
  1. The operation was infiltrated by the gestapo, the german secret police.

    這次行動被德國秘密警察蓋士太保偵破了。
  2. About federation ' s concrete implementation operation plan, because involves to originally can the high - level commercial secret matters concerned, states in detail inconveniently in this regulation, the details defer to this federation the related regulation and the service objective and the concrete plan implementation operation handle

    關于聯合會的具體實施運作方案,因涉及到本會高級商業機密事宜,在本章程里不便詳說,詳情則按照本聯合會的有關章程和業務宗旨及具體方案實施運作辦理。
  3. A professional robbery group, consisted of three man and a woman, has been successful in robbing the money of triad gangs for many years. however, they lose in the final operation. one of them and the man behind the scene betray their secret hiding place

    三男一女組成職業械劫集團,專門黑吃黑,多年來一直合作成功,但在最後一擊卻失手,加上有人出賣兄弟,令三人受到黑白兩道的圍剿追殺,女的捨己救人,兩男誓報此仇
  4. 6. presenting an authorization - based encryption algorithm, which using two encryption parameters, a public secret key and a private secret key, and converting user password into pc to save in database by exclusive - or logical operation

    ( 6 )提出了一種針對cms用戶權限的加密演算法,該演算法具有公匙和私匙兩個加密參數,通過異或等邏輯運算將用戶口令加密成偽碼再進行存儲。
  5. Both peer a and peer b can use a shared key to exchange a secret message, or peer a can use the private key that corresponds to a public key that peer b holds to perform the same operation

    如對等點a和對等點b都可以用一個共享密鑰交換秘密的訊息,或對等點a可以使用對應于對等點b持有的公用密匙的私用密鑰來完成同樣的操作。
  6. Considering system security, we adopt mfcc to recognize password and lpcc to represent speaker track dynamic movement. the double decrees enable it applying in high secret situations. the system has many merit such as the quick operation velocity, easy model update, less calculate quantity and low error rate

    本文考慮到系統的安全性,採用美爾倒譜系數識別密碼,線性預測倒譜差分識別說話人聲道動態變化的雙重判決方法,為系統應用在高度機密場合提供了可能,具有運算速度快,模板更新容易,計算量小,差錯率低等優點。
  7. The report operation in the preceding paragraph shall record the detail required by communication report and protect the secret or privacy of the victim from being disclosed

    前項通報作業,應就通報表所定內容詳實填載,並注意維護被害人之秘密或隱私,不得?漏。
  8. Brief introduction of major of legal article secret develops a target : education gets used to development of socialist market economy and reform of our country judicatory and legal construction need, master theory of legal major foundation and article secret knowledge, have law and technical ability of article secret operation, heart, wisdom, the has innovation mind application that body develops in the round compound model professional

    法律文秘專業簡介培養目標:培養適應社會主義市場經濟發展和我國司法改革及法制建設需要,把握法律專業基礎理論和文秘知識,具備法律及文秘操作技能,德、智、體全面發展的有創新精神的應用型復合型專業人才。
  9. Through introducing the usual practice of the bid and tender of construction projects in chongqing, it analyzes many problems during the invitation to bid of construction projects in chongqing, mainly including secret operation, unjust formation and fairness of bid appraising committee and imperfect system of bid appraising method etc. in the aspect of solving problems, we should not only strengthen the specialists " action but also pay attention to their fairness, and implement list tender of engineering quantity and bid - winning method at the lowest appraised price under the circumstance of sound system

    重慶市建設工程招標通過十幾年的實踐已經積累了相當多的經驗並形成了一整套制度,通過介紹重慶市建設工程招投標的通行做法,部析了重慶市建設工程招標過程中存在的諸多問題,主要問題是暗箱操作、評標委員會的產生和公正性有待加強、缺乏評標辦法完整體系等。在問題的解決方面,主要是即要加強專家的作用也要注意如何做到專家公平性,在制度健全的情況下推行工程量清單招標和經評審的最低價中標法招標。
  10. A secret operation the day after the wedding

    在婚禮后的一次秘密行動
  11. Here it is necessary to remove the secret operations guide : mouse operation 4 when the same pattern became a box will be deleted when the logo, please refer to the beginning of game intructions, a graphic description

    那就要解開這里的秘密了操作指南:鼠標操作,當四個相同的圖案圍成一個方框時就會消去其中的圖案,詳細請看開始時的" game intructions " ,有圖案說明。
  12. Security on secret information network system is different from the general information network. after doing the abundant investigation to x institute information network system, a solution on its system physics safe, network operation security, information safe and secret and safe and secret management, etc. has been designed according to the safety engineering. the designed scheme for the x institute has passed the evaluation of " the national weaponry secret qualification of production unit of scientific research examine authentication "

    根據涉密信息網路對安全的特殊性,根據國家對涉密信息網路安全的相關規范,筆者對x所的信息網路系統進行了充分的調查,以及系統脆弱性和風險分析后,按照信息系統安全工程的方法設計了針對該所整個信息網路系統物理安全、網路運行安全、信息安全保密以及安全保密管理等方面的解決方案,完成了網路安全域劃分、防電磁泄漏、安全審計、網路安全管理、信息傳輸加密和訪問控制等工作。
分享友人